Re: [HACKERS] WAL -> Replication

2002-04-27 Thread Hannu Krosing
On Fri, 2002-04-26 at 19:41, Tom Lane wrote: > Hannu Krosing <[EMAIL PROTECTED]> writes: > > DB2 can run in two modes > > 1) similar to ours, where logs are reused after checkpoints/commits > > allow it. > > 2) with log archiving: logs are never reused, but when system determines > > it no longer

Re: [HACKERS] WAL -> Replication

2002-04-26 Thread Bruce Momjian
Tom Lane wrote: > Hannu Krosing <[EMAIL PROTECTED]> writes: > > DB2 can run in two modes > > 1) similar to ours, where logs are reused after checkpoints/commits > > allow it. > > 2) with log archiving: logs are never reused, but when system determines > > it no longer needs them, it will hand sai

Re: [HACKERS] WAL -> Replication

2002-04-26 Thread Tom Lane
Hannu Krosing <[EMAIL PROTECTED]> writes: > DB2 can run in two modes > 1) similar to ours, where logs are reused after checkpoints/commits > allow it. > 2) with log archiving: logs are never reused, but when system determines > it no longer needs them, it will hand said log over to archiving proc

Re: [HACKERS] WAL -> Replication

2002-04-26 Thread Hannu Krosing
On Fri, 2002-04-26 at 07:38, Curt Sampson wrote: > On Thu, 25 Apr 2002, Bruce Momjian wrote: > > > WAL files are kept only until an fsync(), checkpoint, then reused. > > One could keep them longer though, if one really wanted to. > > > Also, the info is tied to direct locations in the file. Yo

Re: [HACKERS] WAL -> Replication

2002-04-25 Thread Curt Sampson
On Thu, 25 Apr 2002, Bruce Momjian wrote: > WAL files are kept only until an fsync(), checkpoint, then reused. One could keep them longer though, if one really wanted to. > Also, the info is tied to direct locations in the file. You could do > this for hot backup, but it would require quite bi

Re: [HACKERS] WAL -> Replication

2002-04-25 Thread Bruce Momjian
Mike Biamonte wrote: > > > Caveat: I'm not a pg hacker, I apologize > in advance if this is a dumb question, but > it has been nagging at me, and I don't > know who else to ask. > > If the WAL is a record of all transactions, > and if the checkpoint process can be managed > tightly, is it possi

[HACKERS] WAL -> Replication

2002-04-25 Thread Mike Biamonte
Caveat: I'm not a pg hacker, I apologize in advance if this is a dumb question, but it has been nagging at me, and I don't know who else to ask. If the WAL is a record of all transactions, and if the checkpoint process can be managed tightly, is it possible to copy the WAL files from a master D